{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:17:36Z","timestamp":1761895056979},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,3,25]],"date-time":"2010-03-25T00:00:00Z","timestamp":1269475200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s10844-010-0118-3","type":"journal-article","created":{"date-parts":[[2010,3,24]],"date-time":"2010-03-24T05:32:41Z","timestamp":1269408761000},"page":"1-26","source":"Crossref","is-referenced-by-count":14,"title":["Collaborative RFID intrusion detection with an artificial immune system"],"prefix":"10.1007","volume":"36","author":[{"given":"Haidong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Feiqi","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,25]]},"reference":[{"key":"118_CR1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420055009","volume-title":"RFID handbook: Applications, technology, security, and privacy","author":"S Ahson","year":"2008","unstructured":"Ahson, S., & Ilyas, M. (2008). RFID handbook: Applications, technology, security, and privacy. Boca Raton: CRC."},{"key":"118_CR2","doi-asserted-by":"crossref","unstructured":"Aickelin, U., & Cayzer, S. (2002). The danger theory and its applications to artificial immune systems. In Proceedings of the first international conference on artificial immune systems (pp. 141\u2013148).","DOI":"10.2139\/ssrn.2832054"},{"key":"118_CR3","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., & McLeod, J. (2003). Danger theory: The link between AIS and IDS. Report LPL-2003-138, HP Laboratories Bristol 2003. Available at www.hpl.hp.com\/techreports\/2003\/HPL-2003-138.pdf .","DOI":"10.1007\/978-3-540-45192-1_15"},{"issue":"6","key":"118_CR4","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.clsr.2007.09.005","volume":"23","author":"J Ayoade","year":"2007","unstructured":"Ayoade, J. (2007). Privacy and RFID systems: Roadmap to solving security and privacy concerns in RFID systems. Computer Law & Security Reports, 23(6), 555\u2013561.","journal-title":"Computer Law & Security Reports"},{"key":"118_CR5","doi-asserted-by":"crossref","unstructured":"D\u2019haeseleer, P., Forrest, S., & Helman, P. (1996). An immunological approach to change detection: Algorithms, analysis and implications. In Proceedings of IEEE symposium on security and privacy (pp. 110\u2013119).","DOI":"10.1109\/SECPRI.1996.502674"},{"key":"118_CR6","first-page":"84","volume-title":"Proceedings of the 6th Brazilian symposium on neural networks","author":"L Castro De","year":"2000","unstructured":"De Castro, L., & Von Zuben, F. (2000). An evolutionary immune network for data clustering. In Proceedings of the 6th Brazilian symposium on neural networks (pp. 84\u201389). Los Alamitos: IEEE Computer Society."},{"key":"118_CR7","unstructured":"EPCTM (2007). EPCTM radio frequency identity protocols class-1 generation-2 UHF RFID protoco1 for communications at 860M Hz-960MHz version 1.1.0. EPCglobal."},{"key":"118_CR8","first-page":"361","volume-title":"Design principles for immune system & other distributed autonomous systems","author":"S Forrest","year":"2000","unstructured":"Forrest, S., & Hofmeyr, S. (2000). Immunology as information processing. In L. A. Segel, & I. R. Cohen (Eds.), Design principles for immune system & other distributed autonomous systems (pp. 361\u2013387). Oxford: Oxford University Press."},{"key":"118_CR9","first-page":"120","volume-title":"Proceedings of the IEEE symposium on security and privacy","author":"S Forrest","year":"1996","unstructured":"Forrest, S., Longstaff, T., Hofmeyr, S., & Somayaji, A. (1996). A sense of self for unix process. In Proceedings of the IEEE symposium on security and privacy (pp. 120\u2013128). Los Alamitos: IEEE Computer Society."},{"key":"118_CR10","first-page":"201","volume-title":"Proceedings of the IEEE symposium on security and privacy","author":"S Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A., Allen, L., & Cherukuri, R. (1994). Self-nonself discrimination in a computer. In Proceedings of the IEEE symposium on security and privacy (pp. 201\u2013212). Los Alamitos: IEEE Computer Society."},{"issue":"14","key":"118_CR11","first-page":"113","volume":"44","author":"H Fu","year":"2008","unstructured":"Fu, H., & Li, X. (2008). Double-signal based immune intrusion detection model inspired by danger theory. Computer Engineering and Applications, 44(14), 113\u2013117 (in Chinese).","journal-title":"Computer Engineering and Applications"},{"issue":"10","key":"118_CR12","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.3724\/SP.J.1087.2008.02481","volume":"28","author":"J Guo","year":"2008","unstructured":"Guo, J., Yang, H., & Deng, F. (2008). Intrusion detection model for RFID system based on immune network. Journal of Computer Applications, 28(10), 2481\u20132484 (in Chinese).","journal-title":"Journal of Computer Applications"},{"key":"118_CR13","unstructured":"Hofmeyr, S. (2000). An interpretative introduction to the immune system. Department of Computer Science, University of New Mexico. Available at http:\/\/www.cs.unm.edu\/~steveah\/imm-overview-new.pdf ."},{"issue":"4","key":"118_CR14","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., & Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary Computation, 8(4), 443\u2013473.","journal-title":"Evolutionary Computation"},{"issue":"7","key":"118_CR15","first-page":"126","volume":"34","author":"Z Hong","year":"2008","unstructured":"Hong, Z., Wu, L., & Wang, Y. (2008). Worm containment model based on negative selection. Computer Engineering, 34(7), 126\u2013128 (in Chinese).","journal-title":"Computer Engineering"},{"issue":"2","key":"118_CR16","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381\u2013395.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"7","key":"118_CR17","first-page":"1195","volume":"32","author":"J Li","year":"2004","unstructured":"Li, J., Gao, X., & Jiao, L. (2004). A novel clustering method with network structure based on clonal algorithm. ACTA Electronica Sinica, 32(7), 1195\u20131199 (in Chinese).","journal-title":"ACTA Electronica Sinica"},{"issue":"1","key":"118_CR18","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T Lunt","year":"1993","unstructured":"Lunt, T. (1993). A survey of intrusion detection techniques. Computers & Security, 12(1), 405\u2013418.","journal-title":"Computers & Security"},{"key":"118_CR19","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P Matzinger","year":"1994","unstructured":"Matzinger, P. (1994). Tolerance, danger and the extended family. Annual Review of Immunology, 12, 991\u20131045.","journal-title":"Annual Review of Immunology"},{"issue":"7","key":"118_CR20","first-page":"89","volume":"7","author":"L Mirowski","year":"2007","unstructured":"Mirowski, L., & Hartnett, J. (2007). Deckard: A system to detect change of RFID tag ownership. International Journal of Computer Science and Network Security, 7(7), 89\u201398.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"118_CR21","first-page":"719","volume-title":"Proceedings of the 2004 symposium on cryptography and information security (SCIS2004)","author":"M Ohkubo","year":"2004","unstructured":"Ohkubo, M., Suzuki, K., & Kinoshita, S. (2004). Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In Proceedings of the 2004 symposium on cryptography and information security (SCIS2004) (pp. 719\u2013724). Sendai: SCIS."},{"key":"118_CR22","unstructured":"Rivest, R. (1992). The MD5 message-digest algorithm. MIT Laboratory for Computer Science and RSA Data Security, Inc. Available at http:\/\/www.ietf.org\/rfc\/rfc1321.txt ."},{"issue":"2","key":"118_CR23","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MPRV.2008.22","volume":"7","author":"P Rotter","year":"2008","unstructured":"Rotter, P. (2008). A framework for assessing RFID system security and privacy risks. IEEE Pervasive Computing, 7(2), 70\u201377.","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"118_CR24","first-page":"2","volume":"6","author":"SE Sarma","year":"2003","unstructured":"Sarma, S. E., Weis, S. A., & Wengels, D. (2003). Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 6(1), 2\u20139.","journal-title":"RSA Laboratories Cryptobytes"},{"key":"118_CR25","first-page":"1","volume-title":"Military communications conference","author":"G Thamilarasu","year":"2008","unstructured":"Thamilarasu, G., & Sridhar, R. (2008). Intrusion detection in RFID systems. In Military communications conference (pp. 1\u20137). San Diego: IEEE."},{"key":"118_CR26","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Proceedings of the 1st international conference on security in pervasive computing","author":"SA Weis","year":"2004","unstructured":"Weis, S. A., Sarma, S. E., Rivest, R. L., et al. (2004). Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the 1st international conference on security in pervasive computing (pp. 201\u2013212). Berlin: Springer."},{"key":"118_CR27","unstructured":"Williamson, M. (2002). Biologically inspired approaches to computer security. Report LPL-2002-131, HP Laboratories Bristol 2002. Available at http:\/\/www.hpl.hp.com\/techreports\/2002\/HPL-2002-131.pdf ."},{"issue":"2","key":"118_CR28","first-page":"172","volume":"35","author":"H Xu","year":"2009","unstructured":"Xu, H., Xu, C., Cheng, X., & Peng, Z. (2009). Research and design of adaptive intrusion prevention system for co-stimulated by danger signals. Computer Engineering, 35(2), 172\u2013174 (in Chinese).","journal-title":"Computer Engineering"},{"issue":"3","key":"118_CR29","first-page":"627","volume":"27","author":"Q Zhang","year":"2007","unstructured":"Zhang, Q., Qian, Y., Xu, B., Gao, T., & Xie, K. (2007). Negative-selection algorithm of mutation search in self space to train detector. Journal of Computer Applications, 27(3), 627\u2013629 (in Chinese).","journal-title":"Journal of Computer Applications"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-010-0118-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-010-0118-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-010-0118-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T02:10:48Z","timestamp":1559268648000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-010-0118-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,25]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["118"],"URL":"https:\/\/doi.org\/10.1007\/s10844-010-0118-3","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,25]]}}}